Searched refs:authmode (Results 1 – 9 of 9) sorted by relevance
436 ap_info->authmode = WIFI_AUTH_OPEN; in haas200_wifi_sta_get_link_status()440 ap_info->authmode = WIFI_AUTH_WEP; in haas200_wifi_sta_get_link_status()444 ap_info->authmode = WIFI_AUTH_WPA_PSK; in haas200_wifi_sta_get_link_status()449 ap_info->authmode = WIFI_AUTH_WPA2_PSK; in haas200_wifi_sta_get_link_status()452 ap_info->authmode = WIFI_AUTH_MAX; in haas200_wifi_sta_get_link_status()
238 int authmode = MBEDTLS_SSL_VERIFY_NONE; in http_ssl_conn_wrapper() local257 authmode = MBEDTLS_SSL_VERIFY_REQUIRED; in http_ssl_conn_wrapper()350 mbedtls_ssl_conf_authmode(&ssl->ssl_conf, authmode); in http_ssl_conn_wrapper()
986 unsigned int authmode : 3; /*!< MBEDTLS_SSL_VERIFY_XXX */ member1319 void mbedtls_ssl_conf_authmode( mbedtls_ssl_config *conf, int authmode );2333 int authmode );
1100 int authmode = MBEDTLS_SSL_VERIFY_NONE; in rws_ssl_conn() local1117 authmode = MBEDTLS_SSL_VERIFY_REQUIRED; in rws_ssl_conn()1214 mbedtls_ssl_conf_authmode(&ssl->ssl_conf, authmode); in rws_ssl_conn()1259 ERR("svr_cert varification failed. authmode:%d", authmode); in rws_ssl_conn()1266 WRN("svr_cert varification ok. authmode:%d", authmode); in rws_ssl_conn()
244 wifi_auth_mode_t authmode; /* authmode of AP */ member
5695 : ssl->conf->authmode; in mbedtls_ssl_parse_certificate()5697 const int authmode = ssl->conf->authmode; in mbedtls_ssl_parse_certificate() local5723 authmode == MBEDTLS_SSL_VERIFY_NONE ) in mbedtls_ssl_parse_certificate()5753 authmode == MBEDTLS_SSL_VERIFY_OPTIONAL ) in mbedtls_ssl_parse_certificate()5772 if( authmode != MBEDTLS_SSL_VERIFY_NONE ) in mbedtls_ssl_parse_certificate()5790 if( authmode == MBEDTLS_SSL_VERIFY_COMPARE ) in mbedtls_ssl_parse_certificate()5862 if( authmode == MBEDTLS_SSL_VERIFY_OPTIONAL && in mbedtls_ssl_parse_certificate()7169 conf->authmode = authmode; in mbedtls_ssl_conf_authmode()7363 int authmode ) in mbedtls_ssl_set_hs_authmode() argument7365 ssl->handshake->sni_authmode = authmode; in mbedtls_ssl_set_hs_authmode()[all …]
2681 int authmode; in ssl_write_certificate_request() local2689 authmode = ssl->handshake->sni_authmode; in ssl_write_certificate_request()2692 authmode = ssl->conf->authmode; in ssl_write_certificate_request()2699 authmode == MBEDTLS_SSL_VERIFY_NONE ) in ssl_write_certificate_request()
594 int authmode; member690 if( ( new->authmode = get_auth_mode( auth_str ) ) < 0 ) in sni_parse()694 new->authmode = DFL_AUTH_MODE; in sni_parse()724 if( cur->authmode != DFL_AUTH_MODE ) in sni_callback()725 mbedtls_ssl_set_hs_authmode( ssl, cur->authmode ); in sni_callback()
858 * Fix authentication bypass in SSL/TLS: when authmode is set to optional,862 triggered remotely from either side. (With authmode set to 'required'886 * With authmode set to optional, the TLS handshake is now aborted if the1562 * The default authmode for SSL/TLS clients is now REQUIRED.1605 * With authmode set to SSL_VERIFY_OPTIONAL, verification of keyUsage and
Completed in 48 milliseconds